ノーマルビュー

White House Scraps 'Burdensome' Software Security Rules

著者:BeauHD
2026年1月31日 09:02

🤖 AI Summary

**要約(日本語)**

米ホワイトハウスは、バイデン政権下で策定されたソフトウェア・サプライチェーンのセキュリティ指針を撤廃した。
- OMB(行政管理局)は新たにメモランダム **M‑26‑05** を発行し、2022 年の「M‑22‑18」および 2023 年の「M‑23‑16」改訂版を公式に無効化した。
- これらの指針は「実証性に欠け、過度に負担が大きい」上に、実質的なセキュリティ投資よりも行政手続きの遵守を優先させるとして批判された。
- 今後は各機関の長官が、自機関のミッションとリスク評価に基づき、ソフトウェア・ハードウェア向けの独自のセキュリティポリシーを策定する責任を負う。
- 「一律の方法は存在しない」ことを強調し、プロバイダーのセキュリティは安全な開発原則と包括的リスク評価で検証すべきとした。
- なお、SBOM(Software Bill of Materials)やセキュア開発認証書類など、従来指針で推奨されていたツールの使用は任意で継続できる。

**主なポイント**
1. バイデン政権のソフトウェアセキュリティ指針が撤回。
2. 新方針は「機関ごとのリスクに応じたカスタマイズ」を重視。
3. 以前の強制的な要件(SBOM など)は必須ではなくなるが、使用は許容。
4. 目的は実務的なセキュリティ投資を促し、過度な行政負担を削減すること。
An anonymous reader quotes a report from SecurityWeek: The White House has announced that software security guidance issued during the Biden administration has been rescinded due to "unproven and burdensome" requirements that prioritized administrative compliance over meaningful security investments. The US Office of Management and Budget (OMB) has issued Memorandum M-26-05 (PDF), officially revoking the previous administration's 2022 policy, 'Enhancing the Security of the Software Supply Chain through Secure Software Development Practices' (M-22-18), as well as the follow-up enhancements announced in 2023 (M-23-16). The new guidance shifts responsibility to individual agency heads to develop tailored security policies for both software and hardware based on their specific mission needs and risk assessments. "Each agency head is ultimately responsible for assuring the security of software and hardware that is permitted to operate on the agency's network," reads the memo sent by the OMB to departments and agencies. "There is no universal, one-size-fits-all method of achieving that result. Each agency should validate provider security utilizing secure development principles and based on a comprehensive risk assessment," the OMB added. While agencies are no longer strictly required to do so, they may continue to use secure software development attestation forms, Software Bills of Materials (SBOMs), and other resources described in M-22-18.

Read more of this story at Slashdot.

Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds

著者:msmash
2026年1月31日 03:05

🤖 AI Summary

ノーベル賞のハッキングが、前年に漏れた平和賞受賞者マリア・コリナ・マチャドの名前の原因とみられることが、ノルウェー・ノーベル研究所の内部調査で明らかになった。

* ノーベル財団のシステムに対し、個人または国家的なハッカーが不正アクセスした可能性が高いと結論付けられた。
* この情報漏洩により、受賞が正式に発表される数時間前に予測プラットフォーム「Polymarket」でマチャドへの賭けが急増した。
* ベネズエラの野党指導者であるマチャドは、2025年の平和賞候補としては当初想定されていなかった。
* オスロにあるノーベル委員会の管理部門である同研究所のクリスチャン・ベルグ・ハルピケン所長は「デジタル領域が最大の容疑者」と述べた。
* 明確な犯行動機や証拠が不足しているとして、警察への捜査依頼は行わない方針が取られた。

要するに、ノーベル賞の受賞者情報がハッキングにより流出し、公式発表前に市場での注目が高まったが、捜査は進められていないということだ。
An anonymous reader shares a report: A hacking of the Nobel organization's computer systems is the most likely cause of last year's leak of Nobel Peace Prize laureate Maria Corina Machado's name, according to the results of an investigation [non-paywalled source]. An individual or a state actor may have illegally gained access in a cyber breach, the Norwegian Nobel Institute said on Friday after concluding an internal investigation assisted by security authorities. The leak had triggered an unusual betting surge on Machado at the Polymarket platform hours before she was unveiled as the award recipient in October. The Venezuelan opposition leader hadn't previously been considered a favorite for the 2025 prize. "We still think that the digital domain is the main suspect," said Kristian Berg Harpviken, director of the Oslo-based institute, an administrative arm of the Nobel Committee that awards the prize. The institute has decided against filing for a police investigation given "the absence of a clear theory," he said in an interview in Oslo.

Read more of this story at Slashdot.

County Pays $600,000 To Pentesters It Arrested For Assessing Courthouse Security

著者:BeauHD
2026年1月30日 07:02

🤖 AI Summary

イオワ州ダラス郡の裁判所で、2019 年にペンテスト会社 Coalfire Labs に所属していた Gary DeMercurio 氏と Justin Wynn 氏が、司法当局から正式に交付された「レッドチーム」実施許可書を持ち、ロックピッキングを含む物理的侵入テストを行った。テスト中に警報が作動し警官が駆けつけたが、二人は許可書を提示し一時は容疑が取り下げられた。その後、郡長が自ら介入し、許可が自分の管轄下では無効だとして逮捕。逮捕とその後の言動は不当として訴訟を提起し、最終的に全ての罪状が棄却された。裁判所は同郡に対し不当逮捕・名誉毀損として 60 万米ドルの和解金を支払うよう命じた。今回の事例は、正式な許可があるセキュリティ評価でも、権限の認識違いが法的トラブルに発展し得ることを示している。
An anonymous reader quotes a report from Ars Technica, written by Dan Goodin: Two security professionals who were arrested in 2019 after performing an authorized security assessment of a county courthouse in Iowa will receive $600,000 to settle a lawsuit they brought alleging wrongful arrest and defamation. The case was brought by Gary DeMercurio and Justin Wynn, two penetration testers who at the time were employed by Colorado-based security firm Coalfire Labs. The men had written authorization from the Iowa Judicial Branch to conduct "red-team" exercises, meaning attempted security breaches that mimic techniques used by criminal hackers or burglars. The objective of such exercises is to test the resilience of existing defenses using the types of real-world attacks the defenses are designed to repel. The rules of engagement for this exercise explicitly permitted "physical attacks," including "lockpicking," against judicial branch buildings so long as they didn't cause significant damage. [...] DeMercurio and Wynn's engagement at the Dallas County Courthouse on September 11, 2019, had been routine. A little after midnight, after finding a side door to the courthouse unlocked, the men closed it and let it lock. They then slipped a makeshift tool through a crack in the door and tripped the locking mechanism. After gaining entry, the pentesters tripped an alarm alerting authorities. Within minutes, deputies arrived and confronted the two intruders. DeMercurio and Wynn produced an authorization letter -- known as a "get out of jail free card" in pen-testing circles. After a deputy called one or more of the state court officials listed in the letter and got confirmation it was legit, the deputies said they were satisfied the men were authorized to be in the building. DeMercurio and Wynn spent the next 10 or 20 minutes telling what their attorney in a court document called "war stories" to deputies who had asked about the type of work they do. When Sheriff Leonard arrived, the tone suddenly changed. He said the Dallas County Courthouse was under his jurisdiction and he hadn't authorized any such intrusion. Leonard had the men arrested, and in the days and weeks to come, he made numerous remarks alleging the men violated the law. A couple months after the incident, he told me that surveillance video from that night showed "they were crouched down like turkeys peeking over the balcony" when deputies were responding. I published a much more detailed account of the event here. Eventually, all charges were dismissed.

Read more of this story at Slashdot.

Nike Says It's Investigating Possible Data Breach

著者:msmash
2026年1月27日 03:53

🤖 AI Summary

**要約(日本語)**

Nikeは、サイバー攻撃グループ「World Leaks」から同社の事業データが約1.4テラバイト漏洩したと主張されたことを受け、現在データ侵害の可能性を調査中であると発表した。Nikeは声明で「顧客のプライバシーとデータセキュリティを非常に重要視しており、サイバーセキュリティインシデントの可能性を調査し、状況を評価している」とコメントしている。World Leaksは自らのウェブサイト上で、Nikeの大量データを公開したと主張している。現時点で被害の詳細や影響範囲は明らかになっておらず、同社は今後の対応を検討している。
Nike says it is investigating a potential data breach, after a group known for cyber attacks reportedly claimed to have leaked a trove of data related to its business operations. From a report: "We always take consumer privacy and data security very seriously," Nike said in a statement. "We are investigating a potential cyber security incident and are actively assessing the situation." The ransomware group World Leaks said on its website that it had published 1.4 terabytes of data from Nike.

Read more of this story at Slashdot.

❌